I'm trying to use the "Matching Regular Expression Below" feature for "Include Events" in the Windows Event Log Monitor and it is not working how I expect it to. Does someone have a working example for this feature?
The text that I want to match on is in the message of a standard, run of the mill, Windows Application event log. The match works if I omit the "Include events" filter, but this is too generic for my use case.
This is a snippet of my text that I want to match.
One version of a regex:
I tried multiple iterations with both WMI and RPC:
(The request was aborted: Could not create SSL.TLS secure channel)
"(The request was aborted: Could not create SSL.TLS secure channel)"
(?ms)The request was aborted: Could not create SSL.TLS secure channel
"(?ms)The request was aborted: Could not create SSL.TLS secure channel"
Please Help!
@njoylif @designerfx @aLTeReGo